1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
7

A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w

ho work from home.
What type of network would be most efficient?

A. Domain Name Server
B. HTML
C. Intranet
D. Web browser
Computers and Technology
2 answers:
xenn [34]3 years ago
8 0

Answer:

Option C is the correct answer for the above question.

Explanation:

An Intranet is a combination of two or more LAN(Local area network) which is used to share the information and for communication purpose.

The question asked to set up the network for the company so that all employees can access the internet while there is home or in the office. SO the intranet can give this access because the home area is not farther from the company and the intranet is used when the area distance is not more than one state area. Hence option C is the correct answer while the other is not because--

  • Option A states about DNS which is a domain, not a network.
  • Option B states about HTML which is used to design the website not to access the internet.
  • Option D states about Web browser which is a software able to read the website data.
Alenkasestr [34]3 years ago
4 0
C - An Intranet will give access to all employees within the company, whether they work from home or at the office.
You might be interested in
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being co
kakasveta [241]

Answer:

captive portal

Explanation:

Captive portal -

It is a web page , which is opened along side the web browser which get displayed on to the fresh connected users of the Wi-Fi network , just before it gets the assurance to use the resources of the network , is known as captive portal .

Generally captive portal requires authentication or payment for access the internet resource .

Hence , from the question information , the example shown in the question is about captive portal .

4 0
3 years ago
How many passes will it take to find 30 using a binary search?
dimulka [17.4K]
Just wanna let you know I could be wrong but I think 4 passes
7 0
2 years ago
Which of the following statements about wide area networks are true? Select 3 options.
Montano1993 [528]

Answer:

abd

Explanation:

connections usually occur through a public network

cool devices in a large geographic area

typically uses Ethernet and wirless routers to connect device

7 0
3 years ago
Two electronics students are discussing electrical units. Student A says that electrical power is measured in units called coulo
MakcuM [25]

watts is the measurement for electrical power

V is abbreviation for volts


 Answer is A Neither of the two students is correct

6 0
3 years ago
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
Other questions:
  • You created a vm and installed windows server 2008 r2 over the network, using pxe boot. when you start the vm, it doesn't attemp
    7·1 answer
  • To display measurements on the ruler while changing column widths, hold down the ________ key while dragging the marker.
    13·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • What is the cell membrane used for ​
    14·2 answers
  • What is the most likely result of making a plan for life after high school
    14·1 answer
  • Write a qbasic program to display integer numbers 1 to 100 using the for next loop<br>​
    9·1 answer
  • Your task is to implement a function replace_once(t, d), that takes a text t and a replacement dictionary d, and returns the res
    10·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
  • Example of language processor software
    8·1 answer
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!